The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David Chaum, Hans Van Antwerpen Undeniable Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jean-Jacques Quisquater, Jean-Paul Delescaille How Easy is Collision Search. New Results and Applications to DES. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Kazuo Ohta Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ivan Damgård A Design Principle for Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Richard Cleve Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ivan Damgård On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr. Key Distribution Protocol for Digital Mobile Communication Systems. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Andreas Bender, Guy Castagnoli On the Implementation of Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jurjen N. Bos, Matthijs J. Coster Addition Chain Heuristics. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Silvio Micali Non-Interactive Oblivious Transfer and Spplications. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson How to Explain Zero-Knowledge Protocols to Your Children. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Adi Shamir An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Spyros S. Magliveras, Nasir D. Memon Properties of Cryptosystem PGM. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Shimon Even, Oded Goldreich 0001, Silvio Micali On-Line/Off-Line Digital Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Paul Barrett, Raymund Eisele The Smart Siskette - A Universal User Token and Personal Crypto-Engine. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Agnes Hui Chan, Richard A. Games On the Quadratic Spans of Periodic Sequences. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Moni Naor Bit Commitment Using Pseudo-Randomness. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson Efficient Identification Schemes Using Two Prover Interactive Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1David Chaum The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Hikaru Morita A Fast Modular-multiplication Algorithm based on a Higher Radix. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Cees J. A. Jansen, Dick E. Boekee The Shortest Feedback Shift Register That Can Generate A Given Sequence. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Shafi Goldwasser New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Joe Kilian, Silvio Micali, Rafail Ostrovsky Minimum Resource Zero-Knowledge Proofs (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Yacov Yacobi, Zahava Shmuely On Key Distribution Systems. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Hugh C. Williams A Key Exchange System Based on Real Quadratic Fields. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Paul A. Findlay, Brian A. Johnson Modular Exponentiation Using Recursive Sums of Residues. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Steve R. White Covert Distributed Processing with Computer Viruses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ralph C. Merkle A Certified Digital Signature. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF Receipts, Electronic Funds Transfer, CR categories: 3.56, 3.57, 4.9, Authentication, Cryptography, Digital Signatures, Public Key Cryptosystem, Electronic Signatures
1Mihir Bellare, Lenore Cowen, Shafi Goldwasser On the Structure of Secret Key Exchange Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Donald Beaver, Shafi Goldwasser Multiparty Computation with Faulty Majority. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder A Signature with Shared Verification Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky An Efficient Software Protection Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ernest F. Brickell, Daniel M. Davenport On the Classification of Idea Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1David C. Feldmeier, Philip R. Karn UNIX Password Security - Ten Years Later. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ruth Nelson, John H. Heimann SDNS Architecture and End-to-End Encryption. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Amos Fiat Batch RSA. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Yair Frankel Threshold Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001, Hugo Krawczyk Sparse Pseudorandom Distributions. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jonathan M. Smith Practical Problems with a Cryptographic Protection Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Claus-Peter Schnorr Efficient Identification and Signatures for Smart Cards. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Wyn L. Price Progress in Data Security Standardization. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Russell L. Brand Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Benny Chor, Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ralph C. Merkle One Way Hash Functions and DES. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Johan van Tilburg On the McEliece Public-Key Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Stuart A. Kurtz, Stephen R. Mahaney, James S. Royer On the Power of 1-way Functions (Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1J. R. Sherwood, V. A. Gallo The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Ivan Damgård Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001, Hugo Krawczyk, Michael Luby On the Existence of Pseudorandom Generators. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
1Michael Ben-Or, Oded Goldreich 0001, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway Everything Provable is Provable in Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Josh Cohen Benaloh, Jerry Leichter Generalized Secret Sharing and Monotone Functions. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Manuel Blum 0001, Paul Feldman, Silvio Micali Proving Security Against Chosen Cyphertext Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Bert den Boer Diffie-Hellman is as Strong as Discrete Log for Certain Primes. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Ivan Damgård On the Randomness of Legendre and Jacobi Sequences. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Kencheng Zeng, Minqiang Huang On the Linear Syndrome Method in Cryptanalysis. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Charles Rackoff A Basic Theory of Public and Private Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Marc Girault, Philippe Toffin, Brigitte Vallée Computation of Approximate L-th Roots Modulo n and Application to Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1David G. Steer, Leo Strawczynski, Whitfield Diffie, Michael J. Wiener A Secure Audio Teleconference System. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Tsutomu Matsumoto, Koki Kato, Hideki Imai Speeding Up Secret Computations with Insecure Auxiliary Devices. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Louis C. Guillou, Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology
1Silvio Micali, Adi Shamir An Improvement of the Fiat-Shamir Identification and Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Leonard M. Adleman An Abstract Theory of Computer Viruses. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Neal Koblitz A Family of Jacobians Suitable for Discrete Log Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Tatsuaki Okamoto A Modification of the Fiat-Shamir Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Gustavus J. Simmons How to (Really) Share a Secret. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Ming-Deh A. Huang, Shang-Hua Teng A Universal Problem in Secure and Verifiable Distributed Computation. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Uriel Feige, Adi Shamir, Moshe Tennenholtz The Noisy Oracle Problem. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Joe Kilian Weakening Security Assumptions and Oblivious Transfer (Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Réjane Forré The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Marijke De Soete Bounds and Constructions for Authentication-Secrecy Codes with Splitting. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Ernest F. Brickell, Douglas R. Stinson The Detection of Cheaters in Threshold Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Carl Pomerance (eds.) Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork, Larry J. Stockmeyer Zero-Knowledge With Finite State Verifiers. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001, Eyal Kushilevitz A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt Abuses in Cryptography and How to Fight Them. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Alfredo De Santis, Silvio Micali, Giuseppe Persiano Non-Interactive Zero-Knowledge with Preprocessing. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1B. J. Herbison Developing Ethernet Enhanced-Security System. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Silvio Micali, Claus-Peter Schnorr Efficient, Perfect Random Number Generators. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Richard T. C. Kwok, Maurice Beale Aperiodic Linear Complexities of de Bruijn Sequences. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Russell Impagliazzo, Steven Rudich Limits on the Provable Consequences of One-way Permutations. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Eric Bach 0001 Intractable Problems in Number Theory. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1David Chaum, Amos Fiat, Moni Naor Untraceable Electronic Cash. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra On Generating Solved Instances of Computational Problems. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Michael Lucks A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Silvio Micali How To Sign Given Any Trapdoor Function. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Gilles Brassard, Ivan Damgård "Practical IP" <= MA. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Claude Goutier, Samy Bengio Special Uses and Abuses of the Fiat-Shamir Passport Protocol. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
1Gustavus J. Simmons A Natural Taxonomy for Digital Information Authentication Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
1Carlisle M. Adams, Henk Meijer Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF public key cryptosystems, goppa codes
1Michael Luby, Charles Rackoff A Study of Password Security. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
1Richard A. Kemmerer Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
1Gustavus J. Simmons An Impersonation-Proof Identity Verfication Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
1Douglas R. Stinson A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license